• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Luo Yating, He Hongjie, Chen Fan, Qu Lingfeng. Security Analysis of Image Encryption for Redundant Transfer Based on Non-Zero-Bit Number Feature[J]. Journal of Computer Research and Development, 2022, 59(11): 2606-2617. DOI: 10.7544/issn1000-1239.20210558
Citation: Luo Yating, He Hongjie, Chen Fan, Qu Lingfeng. Security Analysis of Image Encryption for Redundant Transfer Based on Non-Zero-Bit Number Feature[J]. Journal of Computer Research and Development, 2022, 59(11): 2606-2617. DOI: 10.7544/issn1000-1239.20210558

Security Analysis of Image Encryption for Redundant Transfer Based on Non-Zero-Bit Number Feature

Funds: This work was supported by the National Natural Science Foundation of China (61872303, U1936113).
More Information
  • Published Date: October 31, 2022
  • A encryption algorithm named redundant transfer based on high-capacity reversible data hiding in encrypted images scheme was proposed by Qin et al, which effectively improved the ability to resist existing known-plaintext and cipher-only attacks. Based on the analysis of the redundant transfer image encryption characteristics, a known-plaintext attack method is proposed based on the non-zero-bit number (NZBN). Firstly, the NZBN feature of the image block is defined, and the analysis points out the constant invariance of the NZBN feature of image block before and after the redundant transfer image encryption. And then, the block scrambling key and the bit-plane scrambling key of each image block are estimated in turn by using the invariance of the NZBN feature. Next, the block scrambling key estimation method under the condition of multiple pairs of plain-ciphertext images is given to further improve the estimation accuracy of the block scrambling key. Finally, the key estimation accuracy and time complexity of the proposed method are discussed under different block sizes. Experimental results demonstrate that the key estimation accuracy and time complexity of the algorithm depend on the block size. When the block size is not less than 4×4 pixels, the correct rate of block scrambling key obtained from a pair of plain-ciphertext images exceeds 89%. Even if the block size is reduced to 2×2 pixels, two pairs of plain-ciphertext images may cause information leakage.
  • Related Articles

    [1]You Xin, Yang Hailong, Lei Kelun, Kong Xianghao, Xu Jun, Luan Zhongzhi, Qian Depei. A Cross-Platform Fine-Grained Performance Analysis Technique for Redundant Zeros[J]. Journal of Computer Research and Development, 2023, 60(5): 1164-1176. DOI: 10.7544/issn1000-1239.202111189
    [2]Qu Lingfeng, He Hongjie, Chen Fan, Zhang Shanjun. Security Analysis of Image Encryption Algorithm Based on Block Modulation-Scrambling[J]. Journal of Computer Research and Development, 2021, 58(4): 849-861. DOI: 10.7544/issn1000-1239.2021.20200011
    [3]Nie Dongdong, Gong Yaoling. A Sparse Signal Reconstruction Algorithm Based on Approximate l\-0 Norm[J]. Journal of Computer Research and Development, 2018, 55(5): 1090-1096. DOI: 10.7544/issn1000-1239.2018.20160829
    [4]Ma Chao, Dai Zibin, Li Wei, Nan Longmei, Jin Yu. RPRU: A Unified Architecture for Rotation and Bit-Extraction Operations in General-Propose Processor[J]. Journal of Computer Research and Development, 2018, 55(2): 426-437. DOI: 10.7544/issn1000-1239.2018.20160775
    [5]Ke Yan, Zhang Minqing, Su Tingting. A Novel Multiple Bits Reversible Data Hiding in Encrypted Domain Based on R-LWE[J]. Journal of Computer Research and Development, 2016, 53(10): 2307-2322. DOI: 10.7544/issn1000-1239.2016.20160444
    [6]Zhang Zhuhong, Tao Juan. Micro-Immune Optimization Approach Solving Nonlinear Interval Number Programming[J]. Journal of Computer Research and Development, 2014, 51(12): 2633-2643. DOI: 10.7544/issn1000-1239.2014.20131091
    [7]Zhang Zhaoliang, Chen Haiming, Huang Tingpei, Cui Li. Differentiated Bit Error Rate Estimation for Wireless Networks[J]. Journal of Computer Research and Development, 2014, 51(1): 138-150.
    [8]Lou Zhengzheng, Ye Yangdong, and Liu Ruina. Non-Redundant Multi-View Clustering Based on Information Bottleneck[J]. Journal of Computer Research and Development, 2013, 50(9): 1865-1875.
    [9]Li Guilin and Li Jianzhong. A Node Number Constraint Query Processing Algorithm for Sensor Networks[J]. Journal of Computer Research and Development, 2008, 45(1): 90-96.
    [10]Lü Xin, Feng Dengguo. Founding Computationally Secure Quantum Cryptography Protocols Based on Bit Commitment[J]. Journal of Computer Research and Development, 2005, 42(11): 1918-1923.
  • Cited by

    Periodical cited type(7)

    1. 张淑芬,张宏扬,任志强,陈学斌. 联邦学习的公平性综述. 计算机应用. 2025(01): 1-14 .
    2. 朱智韬,司世景,王健宗,程宁,孔令炜,黄章成,肖京. 联邦学习的公平性研究综述. 大数据. 2024(01): 62-85 .
    3. 李锦辉,吴毓峰,余涛,潘振宁. 数据孤岛下基于联邦学习的用户电价响应刻画及其应用. 电力系统保护与控制. 2024(06): 164-176 .
    4. 刘新,刘冬兰,付婷,王勇,常英贤,姚洪磊,罗昕,王睿,张昊. 基于联邦学习的时间序列预测算法. 山东大学学报(工学版). 2024(03): 55-63 .
    5. 赵泽华,梁美玉,薛哲,李昂,张珉. 基于数据质量评估的高效强化联邦学习节点动态采样优化. 智能系统学报. 2024(06): 1552-1561 .
    6. 杨秀清,彭长根,刘海,丁红发,汤寒林. 基于数据质量评估的公平联邦学习方案. 计算机与数字工程. 2022(06): 1278-1285 .
    7. 黎志鹏. 高可靠的联邦学习在图神经网络上的聚合方法. 工业控制计算机. 2022(10): 85-87+90 .

    Other cited types(9)

Catalog

    Article views (87) PDF downloads (39) Cited by(16)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return